Context-aware systems and adaptive user authentication

Abstract

In this paper we discuss the possibilities of
context-aware systems in providing more secure user
authentication. We describe some approaches in using
context information in adaptive security systems,
especially in adaptive user authentication. In addition,
we discuss some recent results in applying the context
itself as an authentication factor. Recent advances in
cryptographic protocol design and adaptive, context-aware
systems enable the linking of the context information to
the cryptographic keys and authentication. Furthermore,
new protocols make adaptive user authentication easier as
it is possible to combine several different factors in a
single protocol. We give some examples of this and
discuss the further potential of these methods.

abstract = "In this paper we discuss the possibilities of context-aware systems in providing more secure user authentication. We describe some approaches in using context information in adaptive security systems, especially in adaptive user authentication. In addition, we discuss some recent results in applying the context itself as an authentication factor. Recent advances in cryptographic protocol design and adaptive, context-aware systems enable the linking of the context information to the cryptographic keys and authentication. Furthermore, new protocols make adaptive user authentication easier as it is possible to combine several different factors in a single protocol. We give some examples of this and discuss the further potential of these methods.",

N2 - In this paper we discuss the possibilities of
context-aware systems in providing more secure user
authentication. We describe some approaches in using
context information in adaptive security systems,
especially in adaptive user authentication. In addition,
we discuss some recent results in applying the context
itself as an authentication factor. Recent advances in
cryptographic protocol design and adaptive, context-aware
systems enable the linking of the context information to
the cryptographic keys and authentication. Furthermore,
new protocols make adaptive user authentication easier as
it is possible to combine several different factors in a
single protocol. We give some examples of this and
discuss the further potential of these methods.

AB - In this paper we discuss the possibilities of
context-aware systems in providing more secure user
authentication. We describe some approaches in using
context information in adaptive security systems,
especially in adaptive user authentication. In addition,
we discuss some recent results in applying the context
itself as an authentication factor. Recent advances in
cryptographic protocol design and adaptive, context-aware
systems enable the linking of the context information to
the cryptographic keys and authentication. Furthermore,
new protocols make adaptive user authentication easier as
it is possible to combine several different factors in a
single protocol. We give some examples of this and
discuss the further potential of these methods.